A Novel Secure Steganographic Method Based on Zero Tree Method and integer wavelet transform through lifting
scheme is performed for each block. In order to find proper
A secure steganography method based on integer lifting wavelet transform. The cover image is partitioned into 8_8 blocks and then integer wavelet transform through lifting
scheme Resource allocation scheme based on gray wolf optimization algorithm in mobile edge computing Optimization (DWGWO) algorithm to solve the optimal
resource allocation
scheme. The initialization, convergence
The Method of Optical Paths for the Numerical Solution of Integrated Photonics Problems one-dimensional problem, and it is solved using recently proposed one-dimensional bicompact
schemes ТИПОЛОГИЯ ПОЛИЛИНГВАЛЬНОЙ КОММУНИКАЦИИ В КАМПУСЕ ИНТЕРНАЦИОНАЛЬНОГО УНИВЕРСИТЕТА, as well as communication
schemes. Based on the results of the article, the authors of the article develop
Kinds of the SoRHSoRH classification
scheme based on its kinds is advanced. A way of potential risk purchase
Martin-Puplett interferometer for studying THz and subTHz radiation to the Martin-Puplett
scheme, is presented. The possibility of using film polypropylene polarizers
A note on the delay nonlinear parabolic differential equations are established. The first and second order of accuracy difference
schemes (FSOADSs) for the solution of one
Boundary Value Problem of Space-Time Fractional Advection Diffusion Equation difference
scheme of the equivalent partial integro-differential equations. The convergence and unconditional